SlideShare una empresa de Scribd logo
1 de 13
www.tusconsultoreslegales.com [email_address] Data protection/Corporate governance  START  POWEPOINT   Risks and recommendations
www.tusconsultoreslegales.com [email_address] CORPORATE GOVERNANCE   1. COMPANY OBJECTIVES AND LEGAL PLANNING 2. LEGAL PLANNING AND TECHNICAL IMPLEMENTATION 3. TECHNICAL IMPLEMENTATION AND COMPANY OBJECTIVES 5. IDENTIFYING RISKS: AVOIDING CRIMINAL LIABILITIES 6. INTERNAL RISKS 7. EXTERNAL RISKS 8. OPTIMISING TECHNICAL TOOLS 4. EVA (ECONOMIC VALUE ADDED) AND PLANNING OF TECHNICAL DESIGN STAGES 9. CONCLUSIONS
www.tusconsultoreslegales.com [email_address] CORPORATE GOVERNANCE
www.tusconsultoreslegales.com [email_address] 1. COMPANY OBJECTIVES AND LEGAL PLANNING Let us imagine that a company has the following objectives: 1- Managing, finalising and launching the development of a new product 2- Ensuring that the development information remains confidential by previously assessing the risks 3- Ensuring good governance practices, detecting which policies are necessary to guarantee the information  4- Deciding which information systems are suitable based on the specific needs of the product/business  5- Assessing the actions to be performed through the company's external means of communication
www.tusconsultoreslegales.com [email_address] 2. LEGAL PLANNING AND TECHNICAL IMPLEMENTATION Continuing with the example, once the business objectives are known together with the legal perspective: 1- Detecting the intangible assets which will increase the business/product value 2- Assessing the implications of subcontracting development of the project where appropriate 3- Detecting the sensitive points for information leaks (internal staff, communication formats and media, both internal and external) 4- Assessing policies such as the use of e-mail, social networks, remote access, mobile and portable devices through which the information circulates and where it is stored, assessing biometric solutions if the information is very sensitive, whether it is useful to have digital signature certificates to preserve compromising information (using encryption solutions) In other words, how the formats are managed and how information is transported
www.tusconsultoreslegales.com [email_address] 3. TECHNICAL IMPLEMENTATION AND COMPANY OBJECTIVES Once the best alternative for managing formats and assessing information transport has been decided: 1- Specifying the development and implementation stages based on the objectives and the budget which needs to be invested in each development stage so as to minimise risks 2- From the technical measures which it has been decided to implement to minimise risks, detecting with the EVA (Economic Value Added) whether the value of the assets is ensured (accurate valuation of tangible and intangible assets) so as to optimise risk management and create value.
www.tusconsultoreslegales.com [email_address] 4. EVA (ECONOMIC VALUE ADDED) AND PLANNING OF TECHNICAL DEVELOPMENT STAGES  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 5. IDENTIFYING RISKS: AVOIDING CRIMINAL LIABILITIES But what risks should be taken into account and in what type of situation: 1- Analysing and evaluating the physical and logical security measures which have not been implemented and/or are not current (risk of leak from databases or information not properly protected, leaked project information) 2-  Formats which are not suitably protected (information leaks in formats are the most common)  3- Not detecting identity theft (another person other than the employee making negative comments about the company on social networks or carrying out criminal conduct) 4- Unencrypted communication channels (modification and listening to confidential information when transported) 5- Availability of self control measures for accessing information (where appropriate) on users by users themselves (making it possible to detect unauthorised access to confidential, personal and private information). 6- Risk of theft of media, laptops or mobile devices. Information must only be available to users or control authorities and Government law enforcement agencies.
www.tusconsultoreslegales.com [email_address] 6. INTERNAL RISKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 7. EXTERNAL RISKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 8. OPTIMISING TECHNICAL TOOLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 9. CONCLUSIONS As conclusions, we can highlight the following: 1- Valuing the assets (tangible and intangible) for developing the business/product 2- A business/product development project cannot be planned with confidential sensitive information without having conducted a risk analysis 3- The authenticity, confidentiality, integrity, availability, non-repudiation and auditing of the  information must be guaranteed throughout the information life-cycle Planning for the implementation of technical tools cannot be carried out without previous legal assessment and the legal assessment must take into account the BUSINESS OBJECTIVES so as to create value.
www.tusconsultoreslegales.com [email_address] Thank you for your interest [email_address] To purchase documents: www.yourlegalconsultants.com To hire the services of an expert, please contact:

Más contenido relacionado

Destacado (8)

case마케팅
case마케팅case마케팅
case마케팅
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
20060781이성노
20060781이성노20060781이성노
20060781이성노
 
인터넷마케팅12
인터넷마케팅12인터넷마케팅12
인터넷마케팅12
 
20060781이성노
20060781이성노20060781이성노
20060781이성노
 
i-phone case
i-phone casei-phone case
i-phone case
 
Reportes de noi
Reportes de noiReportes de noi
Reportes de noi
 
16 Elm Street
16 Elm Street16 Elm Street
16 Elm Street
 

Similar a Criminal respnsibility: recommendations

Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
oswald1horne84988
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasi
Nova Novelia
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
360 BSI
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]
Luis Martín
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]
Luis Martín
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
bikheet
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
360 BSI
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 

Similar a Criminal respnsibility: recommendations (20)

Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasi
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Data protection process information
Data protection process informationData protection process information
Data protection process information
 
Ict governance
Ict governanceIct governance
Ict governance
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]
 
EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]EN_METAMORG_SERVICES [Modo de compatibilidad]
EN_METAMORG_SERVICES [Modo de compatibilidad]
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 

Más de yourlegalconsultants (8)

Social Networks
Social NetworksSocial Networks
Social Networks
 
Digital evidence
Digital evidenceDigital evidence
Digital evidence
 
Company responsibility: Digital Evidence
Company responsibility: Digital EvidenceCompany responsibility: Digital Evidence
Company responsibility: Digital Evidence
 
Technology Transfer General Concepts. Part II
Technology Transfer General Concepts. Part IITechnology Transfer General Concepts. Part II
Technology Transfer General Concepts. Part II
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirements
 
Index data protection
Index data protectionIndex data protection
Index data protection
 
Digital content creations
Digital content creationsDigital content creations
Digital content creations
 
Security document index
Security document indexSecurity document index
Security document index
 

Último

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 

Último (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 

Criminal respnsibility: recommendations

  • 1. www.tusconsultoreslegales.com [email_address] Data protection/Corporate governance START POWEPOINT Risks and recommendations
  • 2. www.tusconsultoreslegales.com [email_address] CORPORATE GOVERNANCE 1. COMPANY OBJECTIVES AND LEGAL PLANNING 2. LEGAL PLANNING AND TECHNICAL IMPLEMENTATION 3. TECHNICAL IMPLEMENTATION AND COMPANY OBJECTIVES 5. IDENTIFYING RISKS: AVOIDING CRIMINAL LIABILITIES 6. INTERNAL RISKS 7. EXTERNAL RISKS 8. OPTIMISING TECHNICAL TOOLS 4. EVA (ECONOMIC VALUE ADDED) AND PLANNING OF TECHNICAL DESIGN STAGES 9. CONCLUSIONS
  • 4. www.tusconsultoreslegales.com [email_address] 1. COMPANY OBJECTIVES AND LEGAL PLANNING Let us imagine that a company has the following objectives: 1- Managing, finalising and launching the development of a new product 2- Ensuring that the development information remains confidential by previously assessing the risks 3- Ensuring good governance practices, detecting which policies are necessary to guarantee the information 4- Deciding which information systems are suitable based on the specific needs of the product/business 5- Assessing the actions to be performed through the company's external means of communication
  • 5. www.tusconsultoreslegales.com [email_address] 2. LEGAL PLANNING AND TECHNICAL IMPLEMENTATION Continuing with the example, once the business objectives are known together with the legal perspective: 1- Detecting the intangible assets which will increase the business/product value 2- Assessing the implications of subcontracting development of the project where appropriate 3- Detecting the sensitive points for information leaks (internal staff, communication formats and media, both internal and external) 4- Assessing policies such as the use of e-mail, social networks, remote access, mobile and portable devices through which the information circulates and where it is stored, assessing biometric solutions if the information is very sensitive, whether it is useful to have digital signature certificates to preserve compromising information (using encryption solutions) In other words, how the formats are managed and how information is transported
  • 6. www.tusconsultoreslegales.com [email_address] 3. TECHNICAL IMPLEMENTATION AND COMPANY OBJECTIVES Once the best alternative for managing formats and assessing information transport has been decided: 1- Specifying the development and implementation stages based on the objectives and the budget which needs to be invested in each development stage so as to minimise risks 2- From the technical measures which it has been decided to implement to minimise risks, detecting with the EVA (Economic Value Added) whether the value of the assets is ensured (accurate valuation of tangible and intangible assets) so as to optimise risk management and create value.
  • 7.
  • 8. www.tusconsultoreslegales.com [email_address] 5. IDENTIFYING RISKS: AVOIDING CRIMINAL LIABILITIES But what risks should be taken into account and in what type of situation: 1- Analysing and evaluating the physical and logical security measures which have not been implemented and/or are not current (risk of leak from databases or information not properly protected, leaked project information) 2- Formats which are not suitably protected (information leaks in formats are the most common) 3- Not detecting identity theft (another person other than the employee making negative comments about the company on social networks or carrying out criminal conduct) 4- Unencrypted communication channels (modification and listening to confidential information when transported) 5- Availability of self control measures for accessing information (where appropriate) on users by users themselves (making it possible to detect unauthorised access to confidential, personal and private information). 6- Risk of theft of media, laptops or mobile devices. Information must only be available to users or control authorities and Government law enforcement agencies.
  • 9.
  • 10.
  • 11.
  • 12. www.tusconsultoreslegales.com [email_address] 9. CONCLUSIONS As conclusions, we can highlight the following: 1- Valuing the assets (tangible and intangible) for developing the business/product 2- A business/product development project cannot be planned with confidential sensitive information without having conducted a risk analysis 3- The authenticity, confidentiality, integrity, availability, non-repudiation and auditing of the information must be guaranteed throughout the information life-cycle Planning for the implementation of technical tools cannot be carried out without previous legal assessment and the legal assessment must take into account the BUSINESS OBJECTIVES so as to create value.
  • 13. www.tusconsultoreslegales.com [email_address] Thank you for your interest [email_address] To purchase documents: www.yourlegalconsultants.com To hire the services of an expert, please contact:

Notas del editor

  1. 1
  2. 2
  3. 3
  4. 4
  5. It is very 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12